A secure mobility network authentication scheme ensuring user anonymity

6Citations
Citations of this article
6Readers
Mendeley users who have this article in their library.

Abstract

With the rapid growth of network technologies, users are used to accessing various services with their mobile devices. To ensure security and privacy in mobility networks, proper mechanisms to authenticate the mobile user are essential. In this paper, a mobility network authentication scheme based on elliptic curve cryptography is proposed. In the proposed scheme, a mobile user can be authenticated without revealing who he is for user anonymity, and a session key is also negotiated to protect the following communications. The proposed mobility network authentication scheme is analyzed to show that it can ensure security, user anonymity, and convenience. Moreover, Burrows-Abadi-Needham logic (BAN logic) is used to deduce the completeness of the proposed authentication scheme.

Cite

CITATION STYLE

APA

Chang, Y. F., Tai, W. L., & Hsu, M. H. (2017). A secure mobility network authentication scheme ensuring user anonymity. Symmetry, 9(12). https://doi.org/10.3390/sym9120307

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free